CN115834566A - File transmission system and file transmission method - Google Patents

File transmission system and file transmission method Download PDF

Info

Publication number
CN115834566A
CN115834566A CN202211363834.XA CN202211363834A CN115834566A CN 115834566 A CN115834566 A CN 115834566A CN 202211363834 A CN202211363834 A CN 202211363834A CN 115834566 A CN115834566 A CN 115834566A
Authority
CN
China
Prior art keywords
file
server
network
module
approval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211363834.XA
Other languages
Chinese (zh)
Inventor
王建平
王占兵
李飞
王昊
李佳凝
吕建友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Institute of Atomic of Energy
Original Assignee
China Institute of Atomic of Energy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Institute of Atomic of Energy filed Critical China Institute of Atomic of Energy
Priority to CN202211363834.XA priority Critical patent/CN115834566A/en
Publication of CN115834566A publication Critical patent/CN115834566A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention is suitable for the technical field of computers and provides a file transmission system and a file transmission method, wherein the file transmission system comprises: the file approval module is deployed on a first network and used for approving the attribute information of the file uploaded by the user and sending the approved file to the first server; the first server is used for performing virus checking and killing on the received file, and if no virus exists, the file is sent to a second server deployed in a second network; and the second server is used for receiving and storing the file sent by the first server.

Description

File transmission system and file transmission method
Technical Field
The invention relates to the technical field of computers, in particular to a file transmission system and a file transmission method.
Background
Many enterprises are provided with multiple physically isolated networks, with a need for data file exchange between each isolated network. Aiming at file transmission among isolated networks, the related technology realizes file export by a mode of recording an optical disk by an intermediate machine and then imports the optical disk in another network after reading the optical disk.
Disclosure of Invention
In order to solve the above problem, embodiments of the present invention provide a file transmission system and a file transmission method, so as to at least solve the problem of data loss risk caused by the way of exporting a recordable optical disc in the related art.
The technical scheme of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a file transfer system, where the file transfer system includes:
the file approval module is deployed on a first network and used for approving the attribute information of the file uploaded by the user and sending the approved file to the first server;
the first server is used for performing virus checking and killing on the received file, and if no virus exists, the file is sent to a second server deployed in a second network;
and the second server is used for receiving and storing the file sent by the first server.
In the above solution, the system further includes:
the information identification module is deployed on the first network and used for identifying the file uploaded by the user to obtain the identification information of the file; the identification information comprises a grade of the file;
the information identification module sends the identified file to the file approval module;
correspondingly, the attribute information includes the identification information of the file, and the file approval module is configured to approve the attribute information of the file uploaded by the user, and includes:
examining and approving the identification information of the file, wherein if the grade of the file is greater than the grade of the file corresponding to the second network, the file does not pass the examination and approval; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
In the above solution, the information identification module is configured to identify a file uploaded by a user, and includes:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
In the above solution, the system further comprises:
and the unidirectional transmission module is used for transmitting the file without the virus in the first server to the second server.
In the above solution, the system further includes:
and the file approval module sends the approved files to the first server through the firewall.
In the above solution, the system further includes:
the encryption module is deployed in the first network and used for encrypting the file uploaded by the user by using a set encryption key;
and the decryption module is deployed on the second network and used for decrypting the file received by the second server by using a set decryption key.
In the above scheme, the document approval module is further configured to:
and generating an audit log according to the approval result of the file.
In a second aspect, an embodiment of the present invention provides a file transfer method, where the method includes:
the method comprises the steps that attribute information of a file uploaded by a user is approved on the basis of a file approval module deployed in a first network, and the approved file is sent to a first server;
receiving the file sent by the file approval module based on the first server, checking and killing viruses of the received file, and sending the file to a second server deployed in a second network if the file is not virus-free; the second server is used for receiving and storing the file sent by the first server.
In the above scheme, before approving the attribute information of the file uploaded by the user based on the file approval module deployed in the first network, the method further includes:
identifying a file uploaded by a user based on an information identification module deployed in the first network to obtain identification information of the file, and sending the identified file to the file approval module; the identification information comprises a grade of the file;
correspondingly, the attribute information includes identification information of the file, and the approval of the attribute information of the file uploaded by the user based on the file approval module deployed in the first network includes:
the file approval module is used for approving the identification information of the file;
if the grade of the file is larger than the grade of the file corresponding to the second network, the file is not approved; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
In the foregoing solution, the identifying a file uploaded by a user based on an information identification module deployed in the first network includes:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
According to the embodiment of the invention, the attribute information of the file uploaded by the user is approved through the file approval module arranged in the first network, and the approved file is sent to the first server. The method comprises the steps of carrying out virus checking and killing on a received file based on a first server, sending the file to a second server deployed in a second network if no virus exists, and achieving the purpose of safely transmitting the file from the first network to the second network based on the fact that the file sent by the first server is received and stored by the second server in the second network. According to the embodiment, the file transmission system can automatically complete the rapid transmission of the files among different networks, the recording optical disk is not required to be exported and imported, manual participation is not required, a large amount of manpower and material resources are saved, the file transmission time is shortened, and the file transmission efficiency is improved. And the risk of file leakage caused by the loss and damage of the optical disc is avoided through virus killing, the safety and the reliability of file transmission are ensured, and the method has better applicability to the file transmission among isolation networks.
Drawings
Fig. 1 is a schematic structural diagram of a file transfer system according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of another file transfer system provided in the embodiment of the present invention;
FIG. 3 is a schematic structural diagram of another file transfer system provided in the embodiment of the present invention;
FIG. 4 is a schematic structural diagram of another file transfer system provided in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of another file transmission system according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of another file transfer system provided in the embodiment of the present invention;
FIG. 7 is a schematic structural diagram of another file transfer system according to an embodiment of the present invention;
fig. 8 is a schematic flow chart illustrating an implementation of a file transmission method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Informationization plays an increasingly important role in daily work, and in order to effectively meet the processing and storage requirements of information data of different grades (confidential grades), a plurality of national policy and administration institutions and scientific research units have a plurality of physically isolated networks which are separately managed. In actual practice, there is a need for a large exchange of data files between the various isolated networks. For file transmission between networks of different grades, a common practice at present is to export a file by recording an optical disc by an intermediate machine, and then import the file after reading the optical disc in another network.
In view of the foregoing disadvantages of the related art, embodiments of the present invention provide a file transmission system, which can improve the security of file transmission between different networks. In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 is a schematic structural diagram of a file transfer system according to an embodiment of the present invention, where the file transfer system includes:
the file approval module is deployed on a first network and used for approving the attribute information of the file uploaded by the user and sending the approved file to the first server;
the first server is used for performing virus checking and killing on the received file, and if no virus exists, the file is sent to a second server deployed in a second network;
and the second server is used for receiving and storing the file sent by the first server.
The first network and the second network are two networks isolated from each other, for example, the first network is an intranet, the second network is an extranet, and the embodiment is applied in a scenario of transmitting a file from the first network to the second network.
The file approval module is deployed in a first network, and a user can submit a file export application in the file approval module and transmit the file from the first network to a second network. Here, the file type and size of the file uploaded by the user are not limited, and may be any type and size of file.
The file approval module approves the file, wherein the file approval module can be manual approval or system automatic approval, if the file approval module is manually approved, an approval result can be obtained, and the file approval module conducts transmission control on the file according to the approval result. If the file passes the approval, sending the file to a first server; and if the approval is not passed, refusing to send the file.
If the document approval module automatically approves the document, the document approval module can approve the attribute information of the document according to a preset approval rule. The attribute information of the file includes information of the type, size, version number, author, creation time and level of the file.
For example, if the type of the file is not a preset type, the file is refused to be sent; or if the size of the file is larger than the threshold value, refusing to send the file; or if the version number of the file is smaller than the set version number, refusing to send the file; or if the grade of the file is greater than the preset grade, refusing to send the file; or if the creation time of the file is earlier than the set time point, refusing to send the file; or if the author of the file is not the preset author, refusing to send the file.
Specifically, which attribute information of the document to be approved can be set in the document approval module in advance through the approval rule, when the document is received, the attribute information of the document is approved through the preset approval rule, and if a plurality of attribute information of the document is approved at the same time, the document is allowed to be sent to the first server only by setting that all the attribute information of the document is approved.
The first server can be a server which does not belong to the first network and the second network, the first server can be deployed in the third network, the first server plays a role of intermediate transition, the first server stores the received files into a designated file directory, and the first server has a virus checking and killing function and is used for checking and killing the viruses of the files in the designated file directory. The first server can perform virus killing on the file through a local virus database or call known virus software to perform virus killing on the file. And if no virus exists, sending the file without the virus to a second server deployed in a second network.
The second server is deployed in the second network and used for receiving the file which is sent by the first server and is free of viruses, and therefore the purpose of safely transmitting the file from the first network to the second network is achieved. The second server stores the file in the designated file directory, and a file administrator in the second network has the authority to log in the designated file directory of the second server to download or process the file as required, for example, the file is transmitted to a required user in the second network, uploaded to each system or directly copied and delivered, and finally, the safe and fast file transmission from the first network to the second network is completed.
According to the embodiment of the invention, the attribute information of the file uploaded by the user is approved through the file approval module deployed in the first network, and the approved file is sent to the first server. The method comprises the steps that virus checking and killing are carried out on received files based on a first server, if no virus exists, the files are sent to a second server deployed in a second network, and the files sent by the first server are received and stored based on the second server in the second network, so that the purpose of safely transmitting the files from the first network to the second network is achieved. According to the embodiment, the file transmission system can automatically complete the rapid transmission of the files among different networks, the recording optical disk is not required to be exported and imported, manual participation is not required, a large amount of manpower and material resources are saved, the file transmission time is shortened, and the file transmission efficiency is improved. And the risk of file leakage caused by the loss and damage of the optical disc is avoided through virus killing, the safety and the reliability of file transmission are ensured, and the method has better applicability to the file transmission among isolation networks.
Fig. 2 is a schematic structural diagram of another file transfer system according to an embodiment of the present invention, and based on fig. 1, the file transfer system further includes:
the information identification module is deployed on the first network and used for identifying the file uploaded by the user to obtain the identification information of the file; the identification information comprises a grade of the file;
the information identification module sends the identified file to the file approval module;
correspondingly, the attribute information includes the identification information of the file, and the file approval module is configured to approve the attribute information of the file uploaded by the user, and includes:
examining and approving the identification information of the file, wherein if the grade of the file is greater than the grade of the file corresponding to the second network, the file does not pass the examination and approval; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
Here, the information identification module may automatically identify the file or receive identification information of the file by an administrator. The identification information comprises the grade of the file, the information identification module can grade the file, the grade can represent the importance of the file, and the file exceeding the requirement of the file grade is not allowed to be exported.
In an embodiment, the information identification module is configured to identify a file uploaded by a user, and includes:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
For example, if the file type is a document type, then the file is given a rating of one; if the file type is a video type, the file is given a rating of two. Or, if the file size exceeds 1MB, the file is given a level one; if the file size exceeds 10MB, the file is given a level two. Or, if the file creation time is earlier than the first time point, giving the file a level one; if the file creation time is earlier than the second time point, giving a file grade two; the second time point is earlier than the first time point. Or, if the document author is small, then the document is given a rank one; if the document author is xiao Hua, then the document is given rank two.
Different networks have different file level requirements, and only files meeting the file level requirements corresponding to the second network can be transmitted from the first network to the second network. Therefore, leakage of important files in the network can be avoided, and the safety of file transmission is enhanced.
Fig. 3 is a schematic structural diagram of another file transfer system provided in an embodiment of the present invention, and based on fig. 1, the file transfer system further includes:
and the unidirectional transmission module is used for transmitting the file without the virus in the first server to the second server.
The unidirectional transmission module is connected with the first server, and if the first server checks and kills the file without viruses, the file is transmitted to the second server through the unidirectional transmission module. The unidirectional transmission module is used for unidirectionally transmitting the file, the file can only be transmitted from the first server to the second server, and the file cannot be transmitted from the second server to the first server through the unidirectional transmission module. Therefore, the security of each server can be increased, and the attack can be avoided.
Fig. 4 is a schematic structural diagram of another file transfer system according to an embodiment of the present invention, where on the basis of fig. 1, the file transfer system further includes:
and the file approval module sends the approved files to the first server through the firewall.
Besides the function of transmitting files, the firewall can also perform flow control and data filtering, and if the number of the files simultaneously transmitted to the first server is too large, the firewall can perform flow control, only a part of the files are allowed to be transmitted each time, and the first server is prevented from being blocked and delayed. The server can also preliminarily filter the files and filter the files which do not accord with the rules.
In one embodiment, the document approval module is further configured to:
and generating an audit log according to the approval result of the file.
The audit log comprises an approval result, approval time, file uploading time and file information, and subsequent audit tracking is facilitated.
Fig. 5 is a schematic structural diagram of another file transfer system according to an embodiment of the present invention, where on the basis of fig. 1, the file transfer system further includes:
the encryption module is deployed in the first network and used for encrypting the file uploaded by the user by using a set encryption key;
and the decryption module is deployed on the second network and used for decrypting the file received by the second server by using a set decryption key.
The encryption module possesses a set encryption key, the decryption module possesses a corresponding set decryption key, and if the file cannot be decrypted by using the set decryption key, the file is deleted from the second server.
Here, the set encryption key and the set decryption key may be symmetric keys or asymmetric keys.
Symmetric keys, i.e., the sender and receiver of a file, use the same key to encrypt and decrypt the file. Its most important advantage is that it is quick in encryption/decryption speed, suitable for encrypting large data volume file, but difficult in key management.
Asymmetric keys require the use of different keys to perform the encryption and decryption operations, respectively, one being publicly distributed, i.e., a public key, and the other being held in the user's own secret, i.e., a private key. The sender of the file uses the public key to decrypt and the recipient of the file uses the private key to decrypt. Public key mechanisms are flexible, but encryption and decryption speeds are much slower than symmetric key encryption.
By encrypting the file, the file can be prevented from being leaked in the transmission process, the risk of data loss is reduced, and the safety and reliability of the file are improved.
For example, fig. 6 is a schematic structural diagram of another file transfer system provided in the embodiment of the present invention, where the file transfer system includes:
the information identification module is deployed in the first network and used for identifying files uploaded by the user;
the file approving module is deployed on a first network and used for approving the attribute information of the file uploaded by the user;
the firewall is deployed in the first network, and the approved file is sent to the first server;
the system comprises a first server and a one-way transmission module, wherein the first server and the one-way transmission module are used for performing virus checking and killing on a received file, and if no virus exists, the file is transmitted to a second server through the one-way transmission module;
and the second server is deployed in the second network and used for receiving the file sent by the first server and storing the file into the specified file directory.
The file administrator in the second network has the authority to log in the specified file directory of the second server to download or process the file as required, for example, the file is transmitted to the required user in the second network, uploaded to each system or directly copied and delivered, and finally the safe and fast file transmission from the first network to the second network is completed.
Fig. 7 is a schematic structural diagram of another file transfer system according to an embodiment of the present invention, where the file transfer system includes:
the information identification module is deployed in the first network and used for identifying files uploaded by the user;
the file approval module is deployed on a first network and used for approving the attribute information of the file uploaded by the user;
the encryption module is deployed in the first network and used for encrypting the approved files;
the firewall is deployed in the first network, and the encrypted file is sent to the first server;
the first server and the one-way transmission module are used for performing virus checking and killing on the received encrypted file, and if no virus exists, the encrypted file is transmitted to the second server through the one-way transmission module;
the second server is deployed in a second network and used for receiving the encrypted file sent by the first server;
and the decryption module is deployed on the second network and used for decrypting the encrypted file and storing the decrypted file into the specified file directory.
According to the embodiment, files can be transmitted between different networks, the files do not need to be copied, exported and imported, second-level transmission is achieved, the files are automatically transmitted by the system, a large amount of manpower and material resources are saved, and the file transmission time is shortened. The risk of file leakage caused by loss and damage of the optical disc is avoided, the safety and reliability of file transmission are guaranteed, operation log records exist, and tracking is carried out. The method has good applicability to file transmission between isolated networks and has good application prospect.
Fig. 8 is a schematic view of an implementation flow of a file transmission method according to an embodiment of the present invention, where an execution subject of the file transmission method is the file transmission system and the like. Referring to fig. 7, the data acquisition method includes:
s801, approving the attribute information of the file uploaded by the user based on a file approving module deployed in a first network, and sending the approved file to a first server;
s802, receiving the file sent by the file approval module based on the first server, checking and killing viruses of the received file, and sending the file to a second server deployed in a second network if the received file is not virus-free;
and S803, receiving and storing the file sent by the first server based on the second server.
The file transmission method provided by the above embodiment and the file transmission system embodiment belong to the same concept, and the specific implementation process thereof is described in detail in the system embodiment and will not be described herein again.
In an embodiment, before approving the attribute information of the file uploaded by the user based on a file approval module deployed in the first network, the method further includes:
identifying a file uploaded by a user based on an information identification module deployed in the first network to obtain identification information of the file, and sending the identified file to the file approval module; the identification information comprises a grade of the file;
correspondingly, the attribute information includes identification information of the file, and the approval of the attribute information of the file uploaded by the user based on the file approval module deployed in the first network includes:
the file approval module is used for approving the identification information of the file;
if the grade of the file is larger than the grade of the file corresponding to the second network, the file is not approved; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
In an embodiment, the identifying the file uploaded by the user based on the information identification module deployed in the first network includes:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
In an embodiment, the method further comprises:
and transmitting the file without the virus in the first server to the second server through a one-way transmission module.
In one embodiment, the system further comprises:
and sending the approved file to the first server through the firewall.
In an embodiment, the method further comprises:
encrypting the file uploaded by the user by using the set encryption key;
and decrypting the file received by the second server by using the set decryption key.
In one embodiment, the method comprises:
and generating an audit log according to the approval result of the file.
According to the embodiment, the attribute information of the file uploaded by the user is approved through the file approval module deployed in the first network, and the approved file is sent to the first server. The method comprises the steps of carrying out virus checking and killing on a received file based on a first server, sending the file to a second server deployed in a second network if no virus exists, and achieving the purpose of safely transmitting the file from the first network to the second network based on the fact that the file sent by the first server is received and stored by the second server in the second network. According to the embodiment, the file transmission system can automatically complete the rapid transmission of the files among different networks, the recording optical disk is not required to be exported and imported, manual participation is not required, a large amount of manpower and material resources are saved, the file transmission time is shortened, and the file transmission efficiency is improved. And the risk of file leakage caused by the loss and damage of the optical disk is avoided through virus searching and killing, the safety and the reliability of file transmission are ensured, and the method has better applicability to the file transmission among isolation networks.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The technical means described in the embodiments of the present invention may be arbitrarily combined without conflict.
In addition, in the embodiments of the present invention, "first", "second", and the like are used for distinguishing similar objects, and are not necessarily used for describing a specific order or a sequential order.
In addition, the file transmission method provided by the above embodiment and the file transmission system embodiment belong to the same concept, and the specific implementation process thereof is described in detail in the system embodiment and is not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the modules is only one logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or in other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional modules in the embodiments of the present application may be integrated into one processing unit, or each module may be separately regarded as one unit, or two or more modules may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated module described above in the present application may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The technical means described in the embodiments of the present application may be arbitrarily combined without conflict.
In addition, in the examples of the present application, "first", "second", and the like are used for distinguishing similar objects, and are not necessarily used for describing a specific order or a sequential order.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A file transfer system, comprising:
the file approval module is deployed on a first network and used for approving the attribute information of the file uploaded by the user and sending the approved file to the first server;
the first server is used for performing virus checking and killing on the received file, and if no virus exists, the file is sent to a second server deployed in a second network;
and the second server is used for receiving and storing the file sent by the first server.
2. The system of claim 1, further comprising:
the information identification module is deployed on the first network and used for identifying the file uploaded by the user to obtain the identification information of the file; the identification information comprises a grade of the file;
the information identification module sends the identified file to the file approval module;
correspondingly, the attribute information includes the identification information of the file, and the file approval module is configured to approve the attribute information of the file uploaded by the user, and includes:
examining and approving the identification information of the file, wherein if the grade of the file is greater than the grade of the file corresponding to the second network, the file does not pass the examination and approval; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
3. The system of claim 2, wherein the information identification module is configured to identify the file uploaded by the user, and comprises:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
4. The system of claim 1, further comprising:
and the unidirectional transmission module is used for transmitting the file without the virus in the first server to the second server.
5. The system of claim 1, further comprising:
and the file approval module sends the approved files to the first server through the firewall.
6. The system of claim 1, further comprising:
the encryption module is deployed on the first network and used for encrypting the file uploaded by the user by using the set encryption key;
and the decryption module is deployed on the second network and used for decrypting the file received by the second server by using a set decryption key.
7. The system of claim 1, wherein the document approval module is further configured to:
and generating an audit log according to the approval result of the file.
8. A file transfer method applied to the file transfer system according to claim 1, the method comprising:
the method comprises the steps that attribute information of a file uploaded by a user is approved on the basis of a file approval module deployed in a first network, and the approved file is sent to a first server;
receiving the file sent by the file approval module based on the first server, performing virus checking and killing on the received file, and sending the file to a second server deployed in a second network if no virus exists; the second server is used for receiving and storing the file sent by the first server.
9. The method of claim 8, wherein prior to approving the attribute information of the file uploaded by the user based on a file approval module deployed on the first network, the method further comprises:
identifying a file uploaded by a user based on an information identification module deployed in the first network to obtain identification information of the file, and sending the identified file to the file approval module; the identification information comprises the grade of the file;
correspondingly, the attribute information includes identification information of the file, and the approval of the attribute information of the file uploaded by the user based on the file approval module deployed in the first network includes:
the file approval module is used for approving the identification information of the file;
if the grade of the file is larger than the grade of the file corresponding to the second network, the file is not approved; and if the grade of the file is less than or equal to the grade of the file corresponding to the second network, the file passes the approval.
10. The method of claim 9, wherein identifying the file uploaded by the user based on an information identification module deployed on the first network comprises:
identifying the file based on file information of the file;
the file information includes at least one of:
a file type;
the size of the file;
file creation time;
the author of the document.
CN202211363834.XA 2022-11-02 2022-11-02 File transmission system and file transmission method Pending CN115834566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211363834.XA CN115834566A (en) 2022-11-02 2022-11-02 File transmission system and file transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211363834.XA CN115834566A (en) 2022-11-02 2022-11-02 File transmission system and file transmission method

Publications (1)

Publication Number Publication Date
CN115834566A true CN115834566A (en) 2023-03-21

Family

ID=85526297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211363834.XA Pending CN115834566A (en) 2022-11-02 2022-11-02 File transmission system and file transmission method

Country Status (1)

Country Link
CN (1) CN115834566A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116455891A (en) * 2023-04-06 2023-07-18 瑞众银通科技(北京)有限公司 Safety exchange system between data networks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116455891A (en) * 2023-04-06 2023-07-18 瑞众银通科技(北京)有限公司 Safety exchange system between data networks
CN116455891B (en) * 2023-04-06 2023-10-13 瑞众银通科技(北京)有限公司 Safety exchange system between data networks

Similar Documents

Publication Publication Date Title
Prajapati et al. A review on secure data deduplication: Cloud storage security issue
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN101853363B (en) File protection method and system
CN101729550B (en) Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN109361668A (en) A kind of data trusted transmission method
CN202795383U (en) Device and system for protecting data
KR20210050959A (en) Blockchain based file management system and method thereof
CN202872828U (en) A circulation control system of files
CN103413100A (en) File security protection system
CN112329050A (en) File security management terminal and system
CN113779592A (en) Intelligent equipment shear plate data encryption system and method
CN115834566A (en) File transmission system and file transmission method
Ilker et al. Cyber fraud: Detection and analysis of the crypto-ransomware
CN108390857A (en) A kind of method and apparatus of high sensitive network to low sensitive network export
CN110543775A (en) data security protection method and system based on super-fusion concept
CN108399341B (en) Windows dual file management and control system based on mobile terminal
CN106203130A (en) A kind of transparent encipher-decipher method driving layer based on Intelligent Dynamic
CN102761559B (en) Network security based on private data shares method and communication terminal
CN111090887A (en) Conversation content destroying method and device based on instant chat tool
Hu Study of file encryption and decryption system using security key
WO2021035295A1 (en) "secure environment for cryptographic key generation"
CN112039876A (en) Data ferrying method, device, equipment and medium
CN111092860A (en) Medical data safety interaction transmission module
CN105812251A (en) Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms
CN105187379A (en) Multi-party distrust-based password split managing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination